Computer Science ›› 2006, Vol. 33 ›› Issue (9): 74-75.
Previous Articles Next Articles
Online:
Published:
Abstract: Destroying computer network of distributed attack becoming severer and severer. Topology is dynamic during operation of computer network. How to discover and hold back attacks in this case? A model based on mobile agent technology is presented in this pap
Key words: Intrusion detection, Intrusion holding back, Mobile agent, Dynamic topology
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2006/V33/I9/74
Cited